Cyber Threat Actors — mapping your adversary

--

In this article, which is a starting point in our cybersecurity journey, we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how you can perform threat profiling to map those who apply to you or your company.

I do believe that for the beginning will be a better approach to understand who your adversaries are instead of…

--

--

Martin Holovský
Cyber Defense Network (Defensive.Network)

cybersecurity architect - interested in innovative technologies, bio/brain hacking, transhumanism, cyberpunk, blockchain, and deep learning. (Defensive.Network)

Recommended from Medium

Lists